Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Banner Ransomfeed 970x120 1

Author: RedWave Team

Connecting to public Wi-Fi? Even HTTPS isn’t safe! Let’s find out with this tutorial.

Many people believe that accessing only HTTPS sites is enough to ensure security when browsing on unsecured Wi-Fi networks. Spoiler alert: this belief is also a false sense of security. HTTPS: A step forward, but not foolproof HTTPS (HyperText Transfer Protocol Secure) uses encryption protocols such as TLS to protect communication between the browser and the website, ensuring data confidentiality and integrity. While HTTPS does offer significant protection over HTTP. In this article from our WiFi Column , we will show how this protection alone is not enough, especially in unsafe environments such as open Wi-Fi networks. Persistent vulnerabilities on open Wi-Fi

Myths and DNS Spoofing: If I Don’t Make Payments or Log In Online, Am I Really Safe?

It’s often thought that avoiding online dangers is as simple as not making payments or entering credentials while browsing. This approach, while seemingly prudent, is profoundly flawed for several reasons—especially when using open networks, such as public WiFi. One: The data can still be intercepted Even without performing any sensitive actions, such as logging into accounts or entering credit cards, our devices and connections are constantly transmitting data . On unprotected networks, such as open WiFi, this data can be intercepted extremely easily. Among the most exposed information are: Two: Safety does not depend on “traffic type” As RHC, we believe it’s

Protecting your WiFi by hiding the name? This is a false sense of security

Security, especially when it comes to WiFi networks, is often the subject of misunderstandings and clichés. In this series of articles in our WiFI column , we aim to debunk some of the most common myths. We offer clear explanations, concrete data, and practical advice. The goal is to help you navigate the world of wireless connections with greater awareness. In each article, we will address a myth, analyze its origins, present technical evidence, and conclude with our considerations and suggestions. Let’s start with one of the most common: is hiding your network name (SSID) really an effective way to increase security?

Open WiFi Networks: A Fertile Ground for Cybercrime

Nowadays, the proliferation of portable, wearable, and other smart devices has made data exchange, access to resources, and web browsing indispensable. This in-depth look at Wi-Fi focuses on a widely used category of networks. Hotels, airports, conference rooms, public and private companies, hospitals, and so on offer the ability to stay connected within their facilities through so-called open networks (often referred to as guest networks). Open WiFi networks, while useful for their convenience and accessibility, pose one of the most significant threats to cybersecurity. Their lack of protection makes them fertile ground for illicit activity and cybercriminals, who exploit these networks to

WiFi: From Marconi’s Origins to the Wireless Network We Know Today

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this article, we’ll explore the origins and evolution of WiFi. We’ll analyze both the technologies that made it possible and the threats that accompany it. This article is the first in our ” WiFi Column ,” where we’ll delve into the mechanisms and techniques of attack, illustrating the best strategies for protecting our wireless connection. Welcome to a world without wires… and without secrets. The